CVE-2007-5086

Kaspersky Anti-Virus (KAV) and Internet Security 7.0 build 125 do not properly validate certain parameters to System Service Descriptor Table (SSDT) and Shadow SSDT function handlers, which allows local users to cause a denial of service (crash) via the (1) NtUserSendInput, (2) LoadLibraryA, (3) NtOpenProcess, (4) NtOpenThread, (5) NtTerminateProcess, (6) NtUserFindWindowEx, and (7) NtUserBuildHwndList kernel SSDT hooks in kylif.sys; the (8) NtDuplicateObject (DuplicateHandle) kernel SSDT hook; and possibly other kernel SSDT hooks. NOTE: the NtCreateSection vector is covered by CVE-2007-5043.1. NOTE: the vendor disputes that the DuplicateHandle vector is a vulnerability in their code, stating that "it is not an error in our code, but an obscure method for manipulating standard Windows routines to circumvent our self-defense mechanisms."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:*:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky_lab:kaspersky_internet_security:7.0_build125:*:*:*:*:*:*:*

History

21 Nov 2024, 00:37

Type Values Removed Values Added
References () http://osvdb.org/37990 - () http://osvdb.org/37990 -
References () http://secunia.com/advisories/26887 - Vendor Advisory () http://secunia.com/advisories/26887 - Vendor Advisory
References () http://www.kaspersky.com/technews?id=203038706 - () http://www.kaspersky.com/technews?id=203038706 -
References () http://www.rootkit.com/newsread.php?newsid=778 - Exploit () http://www.rootkit.com/newsread.php?newsid=778 - Exploit
References () http://www.vupen.com/english/advisories/2007/3259 - () http://www.vupen.com/english/advisories/2007/3259 -

Information

Published : 2007-09-26 10:17

Updated : 2024-11-21 00:37


NVD link : CVE-2007-5086

Mitre link : CVE-2007-5086

CVE.ORG link : CVE-2007-5086


JSON object : View

Products Affected

kaspersky_lab

  • kaspersky_internet_security
  • kaspersky_anti-virus
CWE
CWE-20

Improper Input Validation